Home > Publications

Publications

36401 - 36500 out of 41,420Page size: 100
  1. Conference contribution › Research
  2. Published

    Amino acids in the asteroidal water-bearing salt crystals hosted in the Zag meteorite

    Chan, QHS., Zolensky, ME., Burton, AS. & Locke, DR., 2016, 47th Lunar and Planetary Science Conference, held March 2016, at The Woodlands, Texas.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Amnesic distributed storage

    Chockler, G., Guerraoui, R. & Keidar, I., 1 Jan 2007, Proceedings of the 21st International Symposium, DISC 2007, Lemesos, Cyprus, September 24-26, 2007. Vol. 4731 LNCS. p. 139-151 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries

    Kinder, J., Zuleger, F. & Veith, H., 2009, Proc. 10th Int. Conf. Verification, Model Checking, and Abstract Interpretation (VMCAI 2009). Springer, p. 214-228

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    An Agent Architecture for Concurrent Bilateral Negotiations

    Alrayes, B. & Stathis, K., 2014, Lecture Notes in Business Information Processing: Impact of Decision Support Systems for Global Environments. Springer, p. 79-89

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    An Agent Development Framework based on Social Positions

    Lekeas, G. K. & Stathis, K., 1 Oct 2004, IEEE Interantional Conference on Systems, Man and Cybernetics. Thiessen, W. & Wieringa, P. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    An Algebra for the Detection and Prediction of Malicious Activity in Concurrent Systems

    Mcevoy, R. & Wolthusen, S. D., May 2010, Proceedings of the 2010 Fifth International Conference on Systems (ICONS 2010). IEEE Computer Society Press, p. 125-133

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    An Algebraic Approach to the Analysis of Constrained Workflow Systems

    Crampton, J., 2004, Proceedings of 3rd Workshop on Foundations of Computer Security (FCS'04). p. 61-74 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    An Algebraic Theory of Complexity for Valued Constraints: Establishing a Galois Connection

    Cohen, D. A., Creed, P., Jeavons, P. G. & Živný, S., 2011, Mathematical Foundations of Computer Science 2011: 36th International Symposium, MFCS 2011, Warsaw, Poland, August 22-26, 2011: Proceedings. Springer, p. 231-242 (Lecture Notes in Computer Science; vol. 6907).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    An Algorithm for the SAT Problem for Formulae of Linear Length

    Wahlström, M., 2005, ESA. p. 107-118 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    An Analysis of Cyclical Interdependencies in Critical Infrastructures

    Svendsen, N. & Wolthusen, S. D., 3 Oct 2007, Proc. Second International Workshop on Critical Information Infrastructures Security (CRITIS 2007). Springer-Verlag, p. 25-36

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    An Analysis of DepenDNS

    Alfardan, N. & Paterson, K., 2010, Information Security. Springer, Vol. 6531. p. 31-37 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    An Analysis of Phishing Blacklists: Google Safe Browsing, OpenPhish, and PhishTank

    Bell, S. & Komisarczuk, P., 4 Feb 2020, Proceedings of the Australasian Computer Science Week Multiconference 2020, ACSW 2020. Association for Computing Machinery (ACM), p. 1-11 11 p. 3. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    An Analysis of Service Degradation Attacks against Real-Time MPLS Networks

    Almutairi, A. & Wolthusen, S. D., 2013, Proceedings of the 2013 Information Security South Africa Conference (ISSA 2013). IEEE Computer Society Press, p. 1-8

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    An analysis of the 3gpp-MAC scheme

    Knudsen, L. R. & Mitchell, C. J., 2001, Proceedings of WCC 2001, Paris, France, 8-12 January 2001. Augot, D. & Carlet, C. (eds.). p. 319-328 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    An Analysis of the Hermes8 Stream Ciphers

    Babbage, S., Cid, C., Pramstaller, N. & Raddum, H., 2007, Proceedings of the 12th Australasian Conference on Information Security and Privacy, ACISP 2007. Springer, Vol. 4586. p. 1-10 11 p. (Lecture Notes in Computer Science - LNCS; vol. 4586).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    An analysis of the moderating effect of age on smartphone adoption and use in the United Arab Emirates: UK Academy of Information Systems (UKAIS)

    Ameen, N. & Willis, R., 2018, An analysis of the moderating effect of age on smartphone adoption and use in the United Arab Emirates: UK Academy of Information Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    An Analysis of the Perceived Value of Using Knowledge Management Systems in Supporting Decision Making Processes

    Abdelrahman, M., Papamichail, K. & French, S., 2010, 11th European Conference on Knowledge Management ECKM . p. 1115-1128

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    An Analysis of the XSL Algorithm

    Cid, C. & Gaetan, L., Dec 2005, Advances in Cryptology - ASIACRYPT 2005. Springer, Vol. 3788. p. 333-352 20 p. (Lecture Notes in Computer Science - LNCS; vol. 3788).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    An anonymous and undeniable payment scheme

    Chen, LI. & Mitchell, C. J., 1997, Proceedings of the First International Conference on Information and Communications Security, ICICS '97, Beijing, China, November 1997. Han, Y., Okamoto, T. & Qing, S. (eds.). Springer-Verlag, p. 478-482 5 p. (Lecture Notes in Computer Science; no. 1334).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    An Architecture for Audit Logging in a Smart Card Environment

    Markantonakis, K., Mar 1999, An Architecture for Audit Logging in a Smart Card Environment.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    An Architecture to Support Multiple Subscriber Identity Applications Accessing Multiple Mobile Telecommunication Access Network Systems

    Francis, L., Mayes, K. & Markantonakis, K., 2008, THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 386-395 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    An Argumentative Model for Service-oriented Agents

    Morge, M., McGinnis, J., Bromuri, S., Mancarella, P. & Stathis, K., 1 Mar 2008, Proc. of the International Symposium on Architectures for Intelligent Theory-Based Agents. Balduccini, M. & Baral, C. (eds.). p. 6 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    An Asymmetric Cryptography Secure Channel Protocol for Smart Cards.

    Rantos, K. & Markantonakis, K., 2004, SEC'04. p. 351-366 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Forthcoming

    An Attack Analysis of Managed Pressure Drilling Systems on Oil Drilling Platforms

    McEvoy, R. & Wolthusen, S. D., 2014, (Accepted/In press) Proceedings of the 9th International Workshop on Critical Information Infrastructures Security. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    An authorization framework resilient to policy evaluation failures

    Crampton, J. & Huth, M., 2010, Computer Security – ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010: Proceedings. Springer, p. 472-487 16 p. (Lecture Notes in Computer Science; vol. 6345).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    An Auto-Delegation Mechanism for Access Control Systems

    Crampton, J. & Morisset, C., 2010, Proceedings of 6th International Workshop on Security and Trust Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks

    Bruschi, D., Cavallaro, L. & Lanzi, A., 2007, 3rd International Workshop on Information Assurance (WIA 2007), April 11-13 2007, New Orleans, Louisiana, USA. IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    An Efficient Toolkit for Computing Private Set Operations

    Davidson, A. & Cid, C., 2017, Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II. Pieprzyk, J. & Suriadi, S. (eds.). Springer Heidelberg, Vol. 2. p. 261-278 18 p. (Lecture Notes in Computer Science; vol. 10343).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. E-pub ahead of print

    An efficient, secure and trusted channel protocol for avionics wireless networks

    Akram, R., Markantonakis, K., Mayes, K., Bonnefoi, P-F., Sauveron, D. & Chaumette, S., 12 Dec 2016, (E-pub ahead of print) 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC). Roy, A. & Schuster, W. (eds.). IEEE Computer Society, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    An electronic array on liquid helium

    Rees, D. G., Glasson, P., Antonov, V., Bennett, R., Fozooni, P., Frayne, P. G., Lea, M. J., Meeson, P. J., Simkins, L. & Mukharsky, Y., 2006, Low Temperature Physics, Pts A and B. Takano, Y., Hershfield, SP., Hirschfeld, PJ. & Goldman, AM. (eds.). MELVILLE: AMER INST PHYSICS, p. 1464-1465 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    An Emerging research Program on Employment Relations in Small Firms in Advanced Capitalist Economies

    Edwards, P., Sen Gupta, S. & Tsai, C-J., 2006, Academy of Management Conference (AOM), Atlanta.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    An Empirical Study of Messaging Passing Concurrency in Go Projects

    Dilley, N. & Lange, J., 18 Mar 2019, SANER 2019 - Proceedings of the 2019 IEEE 26th International Conference on Software Analysis, Evolution, and Reengineering. Shihab, E., Lo, D. & Wang, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 377-387 11 p. 8668036. (SANER 2019 - Proceedings of the 2019 IEEE 26th International Conference on Software Analysis, Evolution, and Reengineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. An evaluation of demand focused chain contribution to industrial sustainability

    Naghi Ganji, E., Shah, S. & Coutroubis, A., 15 Nov 2017, Advances in Manufacturing Technology XXXI : Proceedings of the 15th International Conference on Manufacturing Research, ICMR 2017, Incorporating the 32nd National Conference on Manufacturing Research. El Souri, M., Gao, J. & Keates, S. (eds.). United Kingdom: IOS Press BV, Vol. 6. p. 359-364 6 p. (Advances in Transdisciplinary Engineering; vol. 6).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    An examination of computer-mediated communication for engineering-related tasks

    Lee, J. Y. H. & Panteli, N., 2010, Proceedings of the Annual Hawaii International Conference on System Sciences. 5428613

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    An Examination of the Impacts of a Learning Management System: A Case from Jamaica

    Craig, J. & Harindranath, G., Aug 2015, Proceedings of the 2015 Americas Conference on Information Systems (AMCIS), Puerto Rico, Auguest..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    An experimental comparison of different carbon and glass laminates for ballistic protection

    Zhou, F., Zhang, C., Chen, X., Zhu, C. & Hogg, P. J., 1 Dec 2011, ICCM International Conferences on Composite Materials.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    An Exploration of Consumers' Use of Disposing Practices in their Daily Lives

    Türe, M. & Ger, G., 2011, NA - Advances in Consumer Research. Vol. 39. p. 32-33

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    An exploration of the dependence relationships between self-reported aggression and interpersonal style

    Glorney, E., Lyons, E. & Fritzon, K., 2006, Proceedings of the Conference of the European Association of Psychology and Law: University of Liverpool.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. E-pub ahead of print

    An Exploratory Analysis of the Security Risks of the Internet of Things in Finance

    Shepherd, C., Petitcolas, F., Akram, R. N. & Markantonakis, K., 27 Jul 2017, (E-pub ahead of print) Trust, Privacy and Security in Digital Business: 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings. Lopez, J., Fischer-Hübner, S. & Lambrinoudakis, C. (eds.). Springer-Verlag, p. 164-179 16 p. (Lecture Notes in Computer Science; vol. 10442).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    An Exploratory Analysis on Drug Target Locality

    Caceres Silva, J. & Paccanaro, A., Sep 2017, AGRANDA - Simposio Argentino de GRANdes DAtos 2017.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. An Exploratory Study to Examine Big Data Application on Services and SCM

    Shah, S. & Theodosoulaki, A., 15 Apr 2019, 2018 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2018. Institute of Electrical and Electronics Engineers Inc., p. 155-159 5 p. 8691279. (2018 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    An extensible, self contained, layered approach to context acquisition

    Kramer, D., Kocurova, A., Oussena, S., Clark, T. & Komisarczuk, P., 2011, Proceedings of the Third International Workshop on Middleware for Pervasive Mobile and Embedded Computing. p. 6 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    An Identity for Kernel Ridge Regression

    Zhdanov, F. & Kalnishkan, Y., 2010, Learning Theory 21st International Conference, ALT 2010, Proceedings: volume 6331 of Lecture Notes in Computer Science. Springer, p. 405-419 (Lecture Notes in Computer Science; vol. 6331).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    An improved restricted growth function genetic algorithm for the consensus clustering of retinal nerve fibre data

    Swift, S., Tucker, A., Crampton, J. & Garway-Heath, D., 2007, Proceedings of Genetic and Evolutionary Computation Conference, GECCO 2007. Lipson, H. (ed.). ACM Press, p. 2174-2181 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    An information-theoretic characterization of quantum chaos

    Schack, R. & Caves, C. M., 1997, Quantum Classical Correspondence: Proceedings of the 4th Drexel Symposium on Quantum Nonintegrability. Feng, D. H. & Hu, B. L. (eds.). Cambridge, Massachusetts: International Press, p. 339-353

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    An Innovative Heuristic for Planning-Based Urban Traffic Control

    Franco, S., Lindsay, A., Vallati, M. & McCluskey, T. L., 2018, Computational Science - ICCS 2018: 18th International Conference, Wuxi, China, June 11–13, 2018, Proceedings, Part I. Shi, Y., Fu, H., Tian, Y., Krzhizhanovskaya, V. V., Lees, M. H., Dongarra, J. J. & Sloot, P. M. A. (eds.). Springer, p. 181-193 13 p. (Lecture Notes in Computer Science; vol. 10860).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    An institutionalist perspective of IT-enabled change of Health Management Information Systems in Africa: implications for the Open-Source Software

    Bernardi, R., 2009, 10th International Conference on Social Implications of Computers in Developing Countries: Assessing the Contribution of ICT to Development Goals. Byrne, E., Nicholson, B. & Salem, F. (eds.). IFIP WG9.4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    An interface theory for service-oriented design

    Fiadeiro, J. L. & Lopes, A., 1 Jan 2011, Fundamental Approaches to Software Engineering: 14th International Conference, FASE 2011, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2011, Saarbrücken, Germany, March 26–April 3, 2011. Proceedings. Giannakopoulou, D. & Orejas, F. (eds.). p. 18-33 16 p. (Lecture Notes in Computer Science; vol. 6603).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    An NFC based consumer-level counterfeit detection framework

    Saeed, Q., Walter, C. & Bilal, Z., 2013, The 11th International Conference on Privacy, Security and Trust (PST 2013). IEEE, p. 135-142

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    An Obfuscation-Based Approach against Injection Attacks

    Baiardi, F. & Sgandurra, D., 1 Aug 2011, 2011 Sixth International Conference on Availability, Reliability and Security. p. 51-58 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    An online secret sharing scheme which identifies all cheaters

    Yeun, C. Y., Mitchell, C. J. & Burmester, M., 1998, Proceedings of NORDSEC '98, Trondheim, Norway, November 1998. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    An optimal-control application of two paradigms of on-line learning

    Vovk, V., 1994, Proceedings of the Seventh Annual Workshop on Computational Learning Theory. New York: ACM Press, p. 98-109 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    An Optimization Approach to Robust Goal Obfuscation

    Bernardini, S., Fagnani, F. & Franco, S., Sep 2020, Proceedings of the 17th International Conference on Principles of Knowledge Representation and Reasoningg. International Joint Conferences on Artificial Intelligence, p. 119-129 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    An overview of change management within manufacturing environment

    Syed, M. H. & Shah, S., 2013, Manufacturing Science and Technology (ICMST2013). p. 1205-1209 5 p. (Advanced Materials Research; vol. 816-817).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    An Overview of RFID Technology in Field Material Transfer Management

    Shah, S. & Shim, J., Aug 2021, IEEE International Conference on Management in Emerging Markets.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. An Overview of Smart Manufacturing for Competitive and Digital Global Supply Chains

    Menon, S., Shah, S. & Coutroubis, A., 2 Jul 2018, 2018 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2018. Institute of Electrical and Electronics Engineers Inc., p. 178-183 6 p. 8691224. (2018 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. An overview of sustainable practices in food processing supply chain environments

    Ojo, O. O., Shah, S. & Coutroubis, A., 9 Feb 2018, 2017 IEEE International Conference on Industrial Engineering and Engineering Management, IEEM 2017. IEEE Computer Society Press, p. 1792-1796 5 p. (IEEE International Conference on Industrial Engineering and Engineering Management; vol. 2017-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    An RFID distance bounding protocol

    Hancke, G. & Kuhn, M. G., 2005, Conference on Security and Privacy for Emerging Areas in Communication Networks (Securecomm). p. 67-73

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    An upgraded scanning wire beam profile monitoring system for the ISIS high energy drift space

    Harryman, D., Sep 2017, International Beam Instrumentation Conference 2017. p. 401-405 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    An Upper Bound for Aggregating Algorithm for Regression with Changing Dependencies

    Kalnishkan, Y., 2016, Algorithmic Learning Theory : 27th International Conference, ALT 2016, Bari, Italy, October 19-21, 2016, Proceedings. Springer International Publishing, Vol. 9925. p. 238-252 15 p. (Lecture Notes in Computer Science; vol. 9925).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Analysing and modelling the growth and efficiency of urban transportation infrastructures

    Mohajeri, N., Gudmundsson, A. & Scartezzini, J., 2014, Symposium on Applied Urban Modelling-Planning Urban Infrustructure, Cambridge University.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Analysing evolvable cell design for optimisation of routing options

    Ellin, D. & Flockton, S., Jul 2007, Proceedings Genetic and Evolutionary Computation Conference 2007 (GECCO2007). p. 2687-2694 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Analysing Mu‐Calculus Properties of Pushdown Systems (Tool Presentation)

    Hague, M. & Ong, C-H. L., 2010, SPIN.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Analysing the IOBC Authenticated Encryption Mode

    Mitchell, C. J., 2013, Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, QLD, Australia, July 2013, Proceedings. Boyd, C. & Simpson, L. (eds.). Springer-Verlag, Vol. 7959. p. 1-12 12 p. (Lecture Notes in Computer Science; vol. 7959).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Analysing the Resilience of the Internet of Things Against Physical and Proximity Attacks

    Xu, H., Sgandurra, D., Mayes, K., Li, P. & Wang, R., 2017, The 10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage. p. 291-301 11 p. (Lecture Notes in Computer Science; vol. 10658).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. E-pub ahead of print

    Analysing the security of Google's implementation of OpenID Connect

    Li, W. & Mitchell, C. J., 12 Jun 2016, (E-pub ahead of print) Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, Donostia-San Sebastián, Spain, July 7-8, 2016, Proceedings. Caballero, J., Zurutuza, U. & Rodriguez, R. J. (eds.). Springer-Verlag, p. 357-376 20 p. (Lecture Notes in Computer Science; vol. 9721).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Analysis and implementation of reinforcement learning on a GNU Radio cognitive radio platform

    Ren, Y., Dmochowski, P. A. & Komisarczuk, P., 2010, 5th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, CROWNCOM 2010, Cannes, France, June 9-11, 2010. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Analysis of an innovation-driven supply chain using supply chain innovations from a “low-tech” sector: a perspective from the composites materials sector

    Coronado Mondragon, A. E. & Coronado Mondragon, C. E., 6 Aug 2014, 2014 International Conference on Business Information and Cultural Creativity Industry. Tsai, J. (ed.). Taipei, Taiwan, 11 p. 229

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Analysis of faunal remains: insect analysis

    Elias, S., 2008, Encyclopedia of Archaeology. Persall, D. M. (ed.). Elsevier Science Publishers B.V. (North-Holland), p. 1521-1524

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Analysis of Message Injection in Stream Cipher-based Hash Functions

    Nakano, Y., Cid, C., Fukushima, K. & Kiyomoto, S., 2011, Applied Cryptography and Network Security - 9th International Conference, ACNS 2011. Springer, Vol. 6715. p. 498-513 15 p. (Lecture Notes in Computer Science - LNCS; vol. 6715).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Analysis of the Bit-Search Generator and sequence compression techniques

    Gouget, A., Sibert, H., Berbain, C., Courtois, N., Debraize, B. & Mitchell, C. J., 2005, Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers. Gilbert, H. & Handschuh, H. (eds.). Springer-Verlag, Vol. 3557. p. 196-214 19 p. (Lecture Notes in Computer Science; vol. 3557).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Analyzing ‘IS in developing countries’ research: A bibliometric study

    Choudrie, J. & Harindranath, G., 2011, Proceedings of the 11th IFIP TC 9/WG 9.4 International Conference on Social Implications of Computers in Developing Countries, Kathmandu, Nepal. IFIP9.4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Analyzing and Synthesizing Genomic Logic Functions

    Paoletti, N., Yordanov, B., Hamadi, Y., Wintersteiger, C. M. & Kugler, H., 2014, Computer Aided Verification. p. 343-357 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Analyzing Multi-key Security Degradation

    Luykx, A., Mennink, B. & Paterson, K. G., 2017, Advances in Cryptology – ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Springer-Verlag, Vol. 10625 LNCS. p. 575-605 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10625 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Anatomy of Drive-by Download Attack

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2013, Eleventh Australasian Information Security Conference, AISC 2013, Adelaide, Australia, February 2013. p. 49-58 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Anomalous Taint Detection (Extended Abstract)

    Cavallaro, L. & Sekar, R., 2008, 11th International Symposium on Recent Advances in Intrusion Detection.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines

    Alarifi, S. & Wolthusen, S. D., 2013, Proceedings of the 7th International Conference on Network and System Security (NSS 2013. Springer-Verlag, p. 321-335

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Anomaly Detection of Trajectories with Kernel Density Estimation by Conformal Prediction

    Smith, J., Nouretdinov, I., Craddock, R., Offer, C. & Gammerman, A., 19 Sep 2014, Artificial Intelligence Applications and Innovations: AIAI2014 Workshops. Rhodes, Greece: Springer, p. 271-280 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. E-pub ahead of print

    Anonymity and Rewards in Peer Rating Systems

    Garms, L., Ng, S-L., Quaglia, E. & Traverso, G., 7 Sep 2020, (E-pub ahead of print) Security and Cryptography for Networks: 12th International Conference, SCN 2020, Amalfi, Italy, September 14–16, 2020, Proceedings. Galdi, C. & Kolesnikov, V. (eds.). Springer, p. 277-297 21 p. (Lecture Notes in Computer Science; vol. 12238).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model

    Libert, B., Paterson, K. & Quaglia, E., 2012, Public Key Cryptography. Fischlin, M., Buchmann, J. & Manulis, M. (eds.). Springer, Vol. 7293. p. 206-224 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Anonymous User Revocation for Using Attribute-Based Signature in Cloud Computing

    Xu, Z. & Martin, K. M., 2014, The 6th IEEE International Conference on Cloud Computing Technology and Science. IEEE, p. 358-365

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Another Look at Privacy Threats in 3G Mobile Telephony

    Alam, S. & Mitchell, C. J., 2014, Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings. Susilo, W. & Mu, Y. (eds.). Berlin: Springer-Verlag, p. 386-396 11 p. (Lecture Notes in Computer Science; vol. 8544).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    AntiCheetah: An Autonomic Multi-round Approach for Reliable Computing

    Pietro, R. D., Lombardi, F., Martinelli, F. & Sgandurra, D., 1 Dec 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing. p. 371-379 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Anything but not food: Acculturation and food consumption practices amongst Chinese students in the UK

    Cappellini, B. & Yen, D. A., 2010, Global Marketing conference proceedings .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Aperture Measurements with AC Dipole at the Large Hadron Collider

    Fuster-Martinez, N., Bruce, R., Dilly, J., Maclean, E., Persson, T., Redaelli, S., Tomás, R. & Nevay, L., Jun 2018, 9th International Particle Accelerator Conference. JACoW Publishing, p. 212-215 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Application Management Framework in User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Aug 2009, The 10th International Workshop on Information Security Applications (WISA09). YOUM, H. Y. & Yung, M. (eds.). Busan, Korea: Springer, Vol. 5932/2009. p. 20-35 16 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Application of conformal predictors to tea classification based on electronic nose

    Nouretdinov, I., Li, G., Gammerman, A. & Luo, Z., 2010, Artificial Intelligence Applications and Innovations. Springer, p. 303-310

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots

    Seifert, C., Welch, I. & Komisarczuk, P., 2008, Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008. p. 1426-1432 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    APPLICATION OF GENETIC ALGORITHMS TO INFINITE IMPULSE-RESPONSE ADAPTIVE FILTERS

    FLOCKTON, S. J. & WHITE, M. S., 1993, SCIENCE OF ARTIFICIAL NEURAL NETWORKS II. Ruck, DW. (ed.). BELLINGHAM: SPIE - INT SOC OPTICAL ENGINEERING, p. 414-419 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Application of Inductive Confidence Machine to ICMLA competition data

    Nouretdinov, I., Burford, B. & Gammerman, A., 2009, Proceedings of The Eighth International Conference on Machine Learning and Applications. p. 435-438 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Application of optical diffraction radiation to a non-invasive low-emittance high-brightness beam diagnostics

    Karataev, P., Hamatsu, R., Muto, T., Araki, S., Hayano, H., Urakawa, J., Naumenko, G., Potylitsyn, A. & Hirose, T., 2004, QUANTUM ASPECTS OF BEAM PHYSICS. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, p. 111-118 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Application of Value Stream Mapping in Global Manufacturing Environment

    Shah, S. & Goh, C., 15 Nov 2021, 2021 26th International Conference on Automation and Computing (ICAC). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Application-Binding Protocol in the User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Jul 2011, the 16th Australasian Conference on Information Security and Privacy (ACISP). Parampalli, U. & Hawkes, P. (eds.). Melbourne, Australia: Springer, p. 208-225 18 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Applications of reinforcement learning to cognitive radio networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, Communications Workshops (ICC), 2010 IEEE International Conference on. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Applications of the oriented permission role-based access control model

    Crampton, J. & Chen, L., 2007, Proceedings of the 26th IEEE International Performance Computing and Communications Conference. IEEE Computer Society Press, p. 387-394 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Applying Conformal Prediction to the Bovine TB Diagnosing

    Adamskiy, M., Nouretdinov, I., Mitchell, A., Coldham, N. & Gammerman, A., 2011, 12th INNS EANN-SIG International Conference, EANN 2011 and 7th IFIP WG 12.5 International Conference, Artificial Intelligence Applications and Innovations 2011, Corfu, Greece, September 15--18, 2011, Proceedings , Part II. . p. 449-

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Applying hierarchial and role-based access control to XML documents

    Crampton, J., 2004, Proceedings of 2004 ACM Workshop on Secure Web Services. ACM Press, p. 37-46 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Approaches to integration of uncertain and temporal information in diagnostic reasoning

    Bigham, J., Luo, Z., Cayrac, D., Nordbo, I. & Bouyssounous, B., 1994, Proceedings of Information Processing and the Management of Uncertainty in Knowledge Based Systems. p. 250-255

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. E-pub ahead of print

    Approximation algorithms for general cluster routing problem

    Zhang, X., Du, D., Gutin, G., Ming, Q. & Sun, J., 27 Aug 2020, (E-pub ahead of print) Computing and Combinatorics : 26th International Conference, COCOON 2020, Atlanta, GA, USA, August 29–31, 2020, Proceedings. Kim, D., Uma, R. N., Cai, Z. & Lee, D. H. (eds.). Springer, p. 472-483 12 p. (Lecture Notes in Computer Science; vol. 12273).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    APRIL: Interactively Learning to Summarise by Combining Active Preference Learning and Reinforcement Learning

    Gao, Y., Meyer, C. M. & Gurevych, I., 31 Oct 2018, Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing. Brussels, Belgium: Association for Computational Linguistics, p. 4120-4130 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution